Syed A. Ahson, Mohammad Ilyas142006603X, 978-1-4200-6603-6
Table of contents :
SIP HANDBOOK: SERVICES, TECHNOLOGIES, AND SECURITY OF SESSION INITIATION PROTOCOL……Page 2
Contents……Page 4
Preface……Page 7
Editors……Page 9
Contributors……Page 10
Table of Contents……Page 0
Part I: CONCEPTS & SERVICES……Page 15
1.1 Introduction……Page 16
1.2.1 Peer-to-Peer Networks……Page 17
1.2.2 SIP Fundamentals……Page 18
1.3.1 Extension of SIP……Page 19
1.3.2 Extension of the SIP Location Service……Page 21
1.5 Field of Application of P2P SIP……Page 23
1.7 Conclusion……Page 24
References……Page 25
2.1 Introduction……Page 27
2.2 Building Advanced Media Services……Page 28
2.2.1 Media Server Control Mechanisms……Page 29
2.2.1.1 CCXML and VoiceXML……Page 30
2.2.1.4 MEDIACTRL……Page 31
2.2.1.5 Media Server Control API (JSR2309)……Page 32
2.2.2 SIP Application Servers……Page 33
2.2.2.1 Java-Based Approach……Page 34
2.2.2.2 Developing Advanced Media Services Using Open Source Tools……Page 35
2.3 Service-Oriented Architecture (SOA)……Page 37
2.3.1 SOA and SIP Convergence……Page 38
2.5 Service Convergence Platform of Telecom Operators……Page 40
2.6 SIP and the Future of the Internet……Page 43
2.7.1 Example of Advanced Service: On-Line Transcoding……Page 45
2.7.2 SIP Infrastructure……Page 46
2.7.4 Examples of High-End Videoconferencing……Page 48
References……Page 52
3.1.1 General Context……Page 55
3.1.2 Beyond the State of the Art……Page 56
3.2 Why Introducing IPv6 Could Be Problematic for SIP-Based Architectures……Page 58
3.3 Business and Service Considerations Regarding IPv6 VoIP Migration……Page 59
3.3.1 Context and Objectives……Page 60
3.3.2 Input from IPv6 Transport Migration……Page 63
3.3.3 Business and Strategy Considerations……Page 64
3.3.4.1 First Alternative……Page 65
3.3.4.2 Second Alternative……Page 67
3.3.5 Service Engineering Recommendations……Page 68
3.3.6 Focus on Quality of Service……Page 69
3.4 Handling Technical Issues Raised When Migrating SIP-Based Services to IPv6……Page 70
3.4.1.2 New SIP Attribute: “atypes”……Page 71
3.4.2 Blank SDP Procedure……Page 73
3.4.2.1 Application to Alternative 1……Page 74
3.4.2.2 Application to Alternative 2……Page 76
3.5 Conclusions……Page 79
References……Page 80
4.1 SIP-Based Host Mobility……Page 82
4.1.1 Pre-Call Operation……Page 83
4.1.2 Mid-Call Operation……Page 84
4.2 SIP-Based Network Mobility……Page 85
4.2.1 System Components……Page 86
4.2.2 Re-Registration Operation……Page 87
4.2.3 Re-Invitation Operation……Page 89
4.2.4 Route Optimization……Page 90
4.3.1 Protocol Layer……Page 92
4.3.5 Mobility Support……Page 93
4.3.7 Header Overhead……Page 94
4.3.11 Nesting Impact……Page 95
References……Page 96
5.1 Introduction……Page 98
5.2.1 Definitions……Page 99
5.2.2 Operation Overview……Page 100
5.2.3 A Walk-Through Example……Page 101
5.3.1 Overview……Page 105
5.3.3.1 Operations of the Presence Service……Page 106
5.3.3.2 The Presence Event Package……Page 107
5.3.4 A Walk-Through Example……Page 108
5.4.1 Overview……Page 110
5.4.2.2 XML-Encoded PIDF……Page 111
5.4.3 Examples……Page 112
5.5.1 Introduction……Page 113
5.5.3 Operation……Page 114
5.5.4 Resource List Attributes……Page 115
5.5.5 A Walk-Through Example……Page 118
5.6.1.1 IP Multimedia Subsystem (IMS) of 3GPP……Page 126
5.6.1.2 OMA Presence Service……Page 128
5.6.2 Current Research and Standard of Presence Features That Have Been Developed for SIP……Page 131
References……Page 132
6.1 Introduction……Page 134
6.1.1 Two Introductory Scenarios……Page 135
6.1.1.1 Three-Way Conference……Page 136
6.1.1.2 Large-Scale Conference……Page 138
6.1.2.1 Audio Conferences……Page 139
6.1.2.2 Videoconferencing over IP……Page 140
6.1.4 Presence and Instant Messaging……Page 141
6.1.5 SIP and the IMS……Page 142
6.2.1.2 Tight Coupling……Page 143
6.2.1.3 Full Distribution……Page 145
6.2.2.1 Join Header……Page 146
6.2.2.3 REFER Method……Page 147
6.2.2.5 Conferencing Event States……Page 148
6.2.3 SIP with Multicast……Page 149
6.2.3.1 Any-Source Multicast……Page 150
6.2.3.2 Source-Specific Multicast……Page 151
6.2.3.3 Application Layer Multicast……Page 152
6.2.4 Mobile Group Members……Page 153
6.2.4.1 Unicast-Based Mobility……Page 154
6.2.4.2 Mobile Multicast……Page 155
6.3.1 A Hybrid Architecture for Transparent Group Communication……Page 156
6.4 Peer-Managed Conferences……Page 158
6.4.1 A Simple, Distributed Point-to-Point Model……Page 159
6.4.2 Scalable, Peer-Centric Conferencing Based on SSM……Page 161
6.5 Summary and Conclusions……Page 163
References……Page 164
7.1 Introduction……Page 169
7.2 UPnP……Page 170
7.3 SIP……Page 172
7.5.1 Discovery: Advertisement……Page 175
7.5.2 Discovery: Search……Page 177
7.6 Middleware Implementation……Page 178
7.7 Conclusion……Page 179
References……Page 180
8.1 Protocol Testing……Page 182
8.1.2 Interoperability Testing……Page 183
8.1.3 Compliance Versus Interoperability Testing……Page 184
8.2 Protocol Testing Methods……Page 185
8.2.1.1 Example: SIP REGISTER Session State Machine……Page 186
8.2.2 SIP Testing……Page 187
8.2.2.1 ETSI TS 102 027 Technical Specification for SIP IETF RFC 3261……Page 188
8.2.3 SIP Interoperability Test Events……Page 189
8.3 SIP Testing Tools……Page 192
8.3.1.2 LinkBit Online Protocol Analyzer/Decoder……Page 194
8.3.1.5 Empirix……Page 195
8.3.2.5 Compliance Engine……Page 196
8.3.3 Robustness Tools……Page 197
8.3.3.2 Codenomicon SIP Test Tool……Page 198
8.4.2 Set Up of the Test Environment……Page 199
8.4.3 Testing by Means of a State Machine Approach……Page 200
8.4.4.1 INVITE Features……Page 202
8.4.4.2 State Machine Transitions and ACK Response……Page 203
8.4.5 Robustness Tests……Page 204
8.5 Conclusions and Future Directions……Page 205
References……Page 206
Part II: TECHNOLOGIES……Page 209
9.1 Introduction……Page 210
9.2 Peer-to-Peer Network Technologies……Page 211
9.2.1 Chord……Page 212
9.2.2 Pastry and Bamboo……Page 215
9.3.1.1 Node-Level Operations……Page 217
9.3.1.2 User Operations……Page 218
9.3.2 A P2P Architecture for SIP-Based IP Telephony System……Page 219
9.4.1 Concepts and High-Level Description……Page 222
9.4.2 An Architecture for P2P SIP……Page 223
9.4.3 A Hierarchical P2P-SIP Architecture……Page 224
9.5.2 The dSIP Protocol……Page 225
9.5.2.2 P2P Overlay Structure……Page 226
9.5.3 The RELOAD Protocol……Page 227
9.6 Concluding Remarks……Page 229
References……Page 230
CONTENTS……Page 233
10.1 Introduction……Page 234
10.2.1 Sessions and Mobility……Page 235
10.3 Host Identification and Mobility……Page 239
10.3.1 H-SIP: Abstraction Layer……Page 241
10.3.2 Authentication and Registration……Page 242
10.3.3 Routing……Page 244
10.4.1 Testbed……Page 246
10.4.2.1 Registration……Page 247
10.4.2.2 Call Establishment……Page 249
10.4.3.1 Registration……Page 250
10.4.3.2 Call Establishment……Page 251
10.4.3.3 DNS vs. Handle-DNS Resolution……Page 252
10.5 Future Work……Page 253
10.6 Conclusion……Page 254
References……Page 255
11.1 Introduction……Page 259
11.2.1 Network Layer Solutions……Page 263
11.2.2 Transport Layer Solutions……Page 265
11.2.3 Application Layer Solutions……Page 266
11.3 Seamless Vertical Handoff Support Using SIP……Page 268
11.3.1 S-SIP Handoff Scheme……Page 269
11.3.2 Handoff Period……Page 270
11.3.3 Handoff Initiation Based on User Mobility……Page 271
11.3.4 Simulations Results and Discussions……Page 272
11.4 Efficient Transport of SIP Traffic over SCTP……Page 273
11.4.1 SIP and SCTP Retransmission Mechanisms……Page 274
11.4.2 Proposed Scheme of SIP over PR-SCTP……Page 275
11.4.3 Simulation Results and Discussions……Page 276
References……Page 278
12.1 Introduction……Page 282
12.2 NAT Behavior……Page 283
12.2.2 Mapping Refresh……Page 284
12.2.3 Filtering Behavior……Page 286
12.3 Problem Statement……Page 287
12.4.1 Hole Punching……Page 289
12.4.2 Relaying……Page 291
12.4.3 STUN: A Standardized Set of Functionalities to Support NAT Traversal……Page 294
12.4.4 TURN: A STUN Extension to Support Relaying……Page 296
12.5.1 Signaling Layer: Ensuring Correct Delivery of a Response to a SIP Request……Page 297
12.5.2 Signaling Layer: Ensuring UA Reachability and Supporting Mid-Dialog Requests……Page 300
12.5.3 Traversal for Media Flows: ICE……Page 303
12.6 ALEX: Ensuring End-to-End Connectivity for Both SIP and Media Flows across NATs……Page 307
References……Page 310
13.1 Introduction……Page 312
13.2 Multipoint Session Initiation Protocol (MSIP) Entities……Page 313
13.2.3 MSIP Client Behavior……Page 314
13.3.3 Session Establishment……Page 315
13.4 Messages Flow……Page 316
13.4.1.1 Registration Phase……Page 317
13.4.1.2 Session Initiation Phase……Page 319
13.4.1.4 Joining a Session Phase……Page 322
13.4.1.5 Controlling the Session and Session Updates Phase……Page 323
13.4.1.6 Terminating a Session Phase……Page 326
14.1 Introduction……Page 328
14.2 Conferencing……Page 330
14.2.2 SIP Conference Control……Page 331
14.2.3 Conference Privacy……Page 332
14.3 Media Privacy: Narrowcasting Concept……Page 333
14.3.1 Mute……Page 335
14.3.2 Deafen……Page 336
14.4 System Design and Implementation……Page 337
14.4.2 Policy Evaluation……Page 338
14.4.3 Media Mixing and Distribution……Page 339
14.4.5 Narrowcasting Interfaces……Page 340
14.4.6 System Performance……Page 343
14.5.1 Practical Conferencing……Page 344
14.5.2 Event Notification Framework for Exchanging Narrowcasting Control Status Information……Page 345
14.5.4 Convergence……Page 347
References……Page 348
15.1 Introduction……Page 351
15.2.1 Heterogeneous Subnetwork Technologies in Broadband Convergence Network (BcN)……Page 353
15.2.2 SIP/SDP……Page 354
15.2.3 RSVP-TE for IP/(T-)MPLS Subnetwork……Page 355
15.3.1 Q-SIP/SDP Interaction for End-to-End QoS Session Negotiation……Page 356
15.3.2 Connection Establishment in the IP/MPLS Transit Network……Page 360
15.3.3 Resource Reservation and CAC on IEEE 802.3 Fast/Gigabit Ethernet Switch……Page 363
15.3.4 Resource Reservation and CAC in IEEE 802.11e WLAN……Page 365
15.3.5 QoS-Aware CNM (Q-CNM)……Page 366
15.4.1 Testbed Network of Converged Heterogeneous Wired and Wireless Networks……Page 367
15.4.2.1 Connectivity Establishment for QoS Provisioning at Fast/Gigabit Ethernet……Page 368
15.4.2.2 Connectivity Establishment for QoS Provisioning at IEEE 802.11e Wireless LAN……Page 369
15.4.2.3 Connection Establishment for QoS Provisioning at IP/MPLS Backbone Network……Page 370
15.4.3 Performance Analysis of End-to-End QoS Provisioning……Page 372
15.5 Conclusions……Page 374
References……Page 375
16.1.1 Background……Page 377
16.1.3 Our Work……Page 378
16.2.1 Finite State Machine (FSM)……Page 379
16.2.2 Unified Modeling Language……Page 382
16.2.3 Petri Net Cluster……Page 384
16.3.1 Formal Definition of Timed HCPN and CPN Tools……Page 386
16.3.2.1 Whole SIP Modeling……Page 388
16.3.2.2 Simplified SIP Modeling……Page 389
16.3.3 Timed SIP Model……Page 390
16.3.4 Simulation and Analysis……Page 393
16.4.1 NS-2 and SIP Modeling……Page 394
16.4.2.1 OPNET and QualNet……Page 396
References……Page 397
17.2 Introduction……Page 401
17.3 Mobility Management……Page 403
17.3.2 Network Layer……Page 405
17.3.4 Application Layer……Page 406
17.4.1 Link-Layer (Subnetwork-Layer) Mobility……Page 407
17.4.2 Network-Layer Mobility……Page 408
17.4.3 Transport-Layer Mobility……Page 409
17.4.4 Application-Layer Mobility……Page 410
17.5.1 SIP Mobility Support……Page 412
17.5.2 System Architecture for Performance Evaluation……Page 414
17.5.3 Handoff Delay Analysis……Page 419
17.6 Handoff Delay Mitigations……Page 428
17.7 Summary……Page 432
References……Page 433
Part III: SECURITY……Page 436
18.1 Introduction……Page 437
18.2 SIP Threats and Vulnerabilities……Page 438
18.3 Attacks against the SIP……Page 439
18.3.2 Parsing and Message Injection Attacks……Page 441
18.3.3 Flooding Attacks……Page 443
18.3.4 Signaling Attacks……Page 446
18.4.1 SIP Security Requirement 1: Confidentiality……Page 449
18.5 SIP Security Mechanisms and Services……Page 450
18.6 Conclusions……Page 454
References……Page 455
19.1 Introduction……Page 458
19.2.1 SPIT Definitions……Page 460
19.2.2 Motivation……Page 461
19.3 SPIT Vulnerability Analysis……Page 462
19.4 SPIT Identification Criteria……Page 466
19.4.1.2 SIP Headers’ Semantics (SIP Message Oriented)……Page 467
19.5.1 Anti-SPIT Mechanisms Description……Page 469
19.5.1.1 SPIT Prevention Using Anonymous Verifying Authorities (AVA)……Page 470
19.5.1.5 Progressive Multi Grey-Leveling……Page 471
19.5.1.9 DSIP……Page 472
19.5.2 Anti-SPIT Mechanisms Classification……Page 473
19.6.1 Assessment Criteria……Page 474
19.6.2 Compliance of SPIT Mechanisms to Assessment Criteria……Page 475
19.7 Anti-SPIT Mechanisms and Legal Issues……Page 477
19.8 Conclusions……Page 478
References……Page 479
20.1 Introduction……Page 481
20.2 Motivation……Page 482
20.3 Generalized Anonymity Architectures……Page 484
20.4 Proposals for Anonymity in SIP……Page 487
20.5.1 Mist at a Glance……Page 488
20.5.2 Applying MIST in SIP……Page 491
20.5.2.2 Mobility Issues……Page 492
20.5.2.4 Making a VoIP Call……Page 493
References……Page 495
21.1 Background……Page 498
21.2 Introduction……Page 499
21.3.1 Interworking SIP and IN Applications……Page 500
21.3.2 ENUM Call Flows for VoIP Interworking……Page 503
21.3.3 TRIP for Exporting Phone Routes……Page 504
21.3.4 Implementing Intelligent Network Services in VoIP Application……Page 506
21.4.1 Threats of the Intelligent Network……Page 509
21.4.2 Secure the Intelligent Network with SIP……Page 511
21.4.3 Application of Secure VoIP……Page 513
References……Page 517
22.1 Introduction……Page 519
22.2.1 Measuring Session Based QoS Performance……Page 520
22.2.2 QoS and SIP……Page 522
22.2.2.1.1 Call setup delay……Page 523
22.2.2.1.2 Message transfer delay……Page 525
22.2.2.2 Mobility and Handoff Delay……Page 526
22.2.2.2.1 Mobility management using mobile IP……Page 527
22.2.2.2.2 Mobility management using SIP……Page 528
22.2.2.3 Handoff Delay……Page 532
22.2.2.4 Disruption Time……Page 534
22.2.3 Handoff Delay Disruption of SIP in IP Services……Page 536
22.2.3.1 Handoff Delay Disruption of SIP in VoIP Services……Page 538
22.2.3.1.2 Intradomain handoff delay……Page 539
22.2.3.1.3 Interdomain handoff delay……Page 540
22.2.3.1.4 Disruption time with shadow registration……Page 541
22.2.3.2 Performance of SIP in Fax over IP……Page 542
22.2.3.2.1 Experimental network models……Page 543
22.2.4 Effects of Security Protocols on Performance of SIP……Page 545
22.3 SIP Security……Page 546
22.3.1 Threats from Vulnerability of SIP……Page 547
22.3.2 Threats in SIP Communication Chain……Page 548
22.3.3 Attacks and Threat Models……Page 549
22.3.4.2 Security Mechanisms……Page 550
22.3.4.2.1 Network layer security mechanisms……Page 551
22.3.4.2.2 Transport layer security mechanisms……Page 552
22.3.4.2.3 Application layer security mechanisms……Page 554
22.3.4.3 SIP Processing Cost……Page 556
References……Page 557
23.1 Introduction……Page 560
23.3 SPIT Emergence and Persistence: Potential Reasons……Page 562
23.3.3 Automated SPIT……Page 563
23.4 Architecture……Page 564
23.4.1.1 Authentication Module……Page 565
23.4.1.2 Proxy Check Module……Page 566
23.4.1.3.1 Building white/black lists……Page 567
23.4.1.3.3 Scored global lists……Page 568
23.4.1.4.1 Detect suspicious traffic……Page 569
23.4.1.4.2 Detect safe calls……Page 570
23.4.1.5 Challenge/Response Module……Page 571
23.4.1.6 Audio Analyzer……Page 572
23.4.2.1 Case Study 1……Page 574
23.4.2.2 Case Study 2……Page 576
References……Page 577
24.1 Introduction……Page 579
24.2.2 Fraud in General……Page 580
24.2.3 Fraud in VoIP……Page 581
24.2.4.1 Rule Based Detection……Page 583
24.2.4.2 Artificial Intelligence Based Detection……Page 584
24.3.1 Special Requirements in the VoIP Anti-Fraud Fight……Page 585
24.3.2 Steps Towards the Anti-Fraud Framework……Page 587
24.3.3 Functional Architecture……Page 589
24.4 Conclusion……Page 593
References……Page 594
Reviews
There are no reviews yet.